An architecture for automatically developing secure OLAP applications from models
نویسندگان
چکیده
Decision makers query enterprise information stored in Data Warehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which use specific views or cubes from the corporate DW or Data Marts, based on the multidimensional modelling. Since the information managed is critical, security constraints have to be correctly established in order to avoid unauthorized accesses. In previous work we have defined a ModelDriven based approach for developing a secure DWs repository by following a relational approach. Nevertheless, is also important to define security constraints in the metadata layer that connects the DWs repository with the OLAP tools, that is, over the same multidimensional structures that final users manage. This paper incorporates a proposal to develop secure OLAP applications into our previous approach: improves a UML profile for conceptual modelling; defines a logical metamodel for OLAP applications; and ∗Corresponding author Email addresses: [email protected] (Carlos Blanco), [email protected] (Ignacio Garćıa-Rodŕıguez de Guzmán), [email protected] (Eduardo Fernández-Medina), [email protected] (Juan Trujillo) Preprint submitted to Information and Software Technology November 4, 2014 defines and implements transformations from conceptual to logical models, and from logical models to the secure implementation into a specific OLAP tool (SQL Server Analysis Services).
منابع مشابه
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
Data Warehouses (DW) manage enterprise information that is queried for decision making purposes by using On-Line Analytical Processing (OLAP) tools. The establishment of security constraints in all development stages and operations of the DW is highly important since otherwise, unauthorized users may discover vital business information. The final users of OLAP tools access and analyze the infor...
متن کاملAn MDA approach for developing secure OLAP applications: Metamodels and transformations
Decision makers query enterprise information stored in DataWarehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which employ specific views or cubes from the corporate DW or Data Marts, based on multidimensional modelling. Since the information managed is critical, security constraints have to be correctly established in order to avoid unauthorized access. In prev...
متن کاملAutomatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA Approach
Data Warehouses manage vital information for the decision making process, which may be discovered by unauthorized users if we do not establish security measures in all the stages of the development process. We have proposed an MDA architecture to develop secure Data Warehouses which allows them to be modeled at different abstraction levels (business, conceptual, logical and code level). We take...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملThe Gold Model Case Tool: An Environment for Designing OLAP Applications
The number of On-Line Analytical Processing (OLAP) applications in the market has dramatically increased in the last years. Most of these applications provide their own multidimensional (MD) models to represent main MD properties, thereby making the design totally dependent of the target commercial OLAP application. In this paper, we present a Computer-Aided SoftwareEngineering (CASE) operation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information & Software Technology
دوره 59 شماره
صفحات -
تاریخ انتشار 2015